Wenming Wang , Zhiquan Liu , Lingyan Xue , Haiping Huang , Nageswara Rao Lavuri
{"title":"Malicious vehicle detection scheme based on UAV and vehicle cooperative authentication in vehicular networks","authors":"Wenming Wang , Zhiquan Liu , Lingyan Xue , Haiping Huang , Nageswara Rao Lavuri","doi":"10.1016/j.comnet.2025.111037","DOIUrl":null,"url":null,"abstract":"<div><div>The advancement of the vehicular networks has significantly enhanced the capabilities of intelligent transportation systems. However, the transmission of malicious information (<em>e.g.</em>, false emergency alerts or traffic congestion updates) by comprised vehicles poses a serious threat to emergency response operations, particularly in mountainous regions where signal quality is poor. Recent developments in integrating Unmanned Aerial Vehicles (UAVs) with vehicular networks have introduced new opportunities for enhancing network security, enhancing network security in these challenging environments. In response to these challenges, this paper proposes a UAV and vehicle cooperative authentication scheme for detecting malicious vehicles within vehicular networks. The proposed approach reduces overhead through cooperative authentication between vehicles, while UAVs monitor vehicle behavior in real-time. Additionally, Trusted Centers of Authority (TCAs) are employed to oversee UAV activities, ensuring the integrity of the system. The TCA dynamically allocates suitable UAVs for tasks based on real-time availability, optimizing resource utilization. Furthermore, the proposed scheme introduces a hierarchical TCAs structure, partitioning it into root_TCA and sub_TCA, which mitigates the risk of single points of failure and improves resource efficiency. Comparative analysis demonstrates that the proposed scheme offers superior performance in terms of computational and communication overhead compared to existing methods.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"258 ","pages":"Article 111037"},"PeriodicalIF":4.4000,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625000052","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
The advancement of the vehicular networks has significantly enhanced the capabilities of intelligent transportation systems. However, the transmission of malicious information (e.g., false emergency alerts or traffic congestion updates) by comprised vehicles poses a serious threat to emergency response operations, particularly in mountainous regions where signal quality is poor. Recent developments in integrating Unmanned Aerial Vehicles (UAVs) with vehicular networks have introduced new opportunities for enhancing network security, enhancing network security in these challenging environments. In response to these challenges, this paper proposes a UAV and vehicle cooperative authentication scheme for detecting malicious vehicles within vehicular networks. The proposed approach reduces overhead through cooperative authentication between vehicles, while UAVs monitor vehicle behavior in real-time. Additionally, Trusted Centers of Authority (TCAs) are employed to oversee UAV activities, ensuring the integrity of the system. The TCA dynamically allocates suitable UAVs for tasks based on real-time availability, optimizing resource utilization. Furthermore, the proposed scheme introduces a hierarchical TCAs structure, partitioning it into root_TCA and sub_TCA, which mitigates the risk of single points of failure and improves resource efficiency. Comparative analysis demonstrates that the proposed scheme offers superior performance in terms of computational and communication overhead compared to existing methods.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.